Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 11:19
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
dfa5cb019d9d54fb8f2e9c45087a2d7f
-
SHA1
5a81d19b82c4687981a9c05353a6b2c6a715ee2c
-
SHA256
40a705165bed85c9222db3909f65535f16b41d970f1eac7f76bb6d668c6a42bd
-
SHA512
805f87a1ba2c47e6b6f91a3287ed38897f5e45fdde810edad3630a4368c377e45b43bfd5950716f83130be52ce6373f0c9aa7d46f03053290b230c9310922215
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1NTQ3NzU2NTk1NTUwNjE5Nw.GQUX06.Pbq0TWF2GRv-SAO5r1-eUeE6Sd2lIdRSlv47kk
-
server_id
1255474002336546846
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Client-built.exedescription pid process target process PID 1936 wrote to memory of 2824 1936 Client-built.exe WerFault.exe PID 1936 wrote to memory of 2824 1936 Client-built.exe WerFault.exe PID 1936 wrote to memory of 2824 1936 Client-built.exe WerFault.exe